<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Aftermath: Security trends 2014</title>
	<atom:link href="http://www.epanorama.net/blog/2014/12/21/aftermath-security-trends-2014/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2014/12/21/aftermath-security-trends-2014/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Tue, 14 Apr 2026 22:35:42 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/12/21/aftermath-security-trends-2014/comment-page-1/#comment-1357833</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 16 Mar 2015 09:53:34 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=27727#comment-1357833</guid>
		<description><![CDATA[And the buggiest OS provider award goes to ... APPLE?
Count of 2014&#039;s flaws finds more nasties in Mac OS and iOS than in Windows or Linux
http://www.theregister.co.uk/2015/02/26/windows_beats_apple_linux_with_fewest_bugs_for_2014/

Apple&#039;s operating systems and Linux racked up more vulnerability reports than Windows during 2014, according to research from security outfit GFI.

Cupertino&#039;s OS X and iOS platforms topped the 2014 bug charts with 147 and 127 holes disclosed in each, nudging out the Linux Kernel with 119 flagged flaws, the National Vulnerability database statistics show.

Apple also has the most high-risk holes with 64 reported in OS X, and is just nudged out by Linux in the medium-severity stakes which clocked 74 flaws to iOS&#039; 72.

Windows platforms were far behind with 68 total reported bugs and 20 medium-severity flaws reported. Surveyed Windows releases included Windows 8, 8.1, 7, Vista, and RT, along with Server 2012 and 2008. All had between 30 and 38 vulnerabilities.

Crucially, up to 80 percent of the reported bugs concerned third party applications, and only 13 percent related to the operating systems in question.]]></description>
		<content:encoded><![CDATA[<p>And the buggiest OS provider award goes to &#8230; APPLE?<br />
Count of 2014&#8242;s flaws finds more nasties in Mac OS and iOS than in Windows or Linux<br />
<a href="http://www.theregister.co.uk/2015/02/26/windows_beats_apple_linux_with_fewest_bugs_for_2014/" rel="nofollow">http://www.theregister.co.uk/2015/02/26/windows_beats_apple_linux_with_fewest_bugs_for_2014/</a></p>
<p>Apple&#8217;s operating systems and Linux racked up more vulnerability reports than Windows during 2014, according to research from security outfit GFI.</p>
<p>Cupertino&#8217;s OS X and iOS platforms topped the 2014 bug charts with 147 and 127 holes disclosed in each, nudging out the Linux Kernel with 119 flagged flaws, the National Vulnerability database statistics show.</p>
<p>Apple also has the most high-risk holes with 64 reported in OS X, and is just nudged out by Linux in the medium-severity stakes which clocked 74 flaws to iOS&#8217; 72.</p>
<p>Windows platforms were far behind with 68 total reported bugs and 20 medium-severity flaws reported. Surveyed Windows releases included Windows 8, 8.1, 7, Vista, and RT, along with Server 2012 and 2008. All had between 30 and 38 vulnerabilities.</p>
<p>Crucially, up to 80 percent of the reported bugs concerned third party applications, and only 13 percent related to the operating systems in question.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/12/21/aftermath-security-trends-2014/comment-page-1/#comment-1349313</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 27 Feb 2015 10:08:58 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=27727#comment-1349313</guid>
		<description><![CDATA[Iran hacks America where it hurts: Las Vegas casinos
Digital Pearl Harbour debunked by US director of national intelligence
http://www.theregister.co.uk/2015/02/27/iran_behind_us_casino_hack/

US director of National Intelligence James Clapper has accused Iran of orchestrating a 2014 hack of the Las Vegas Sands casino. The attack crippled the magnificent cultural institution&#039;s IT infrastructure.

Clapper told a US Senate Armed Services Committee Thursday (US time) that the hack of the US$14 billion casino was the handiwork of Iran rather than ordinary hacking groups, Bloomberg reports.

&quot;While both of these nations (Iran and North Korea) have lesser technical capabilities in comparison to Russia and China, these destructive attacks demonstrate that Iran and North Korea are motivated and unpredictable cyber-actors,&quot; Clapper says.

The attacks brought down the casino&#039;s IT systems including email but not the most valuable components of the organisation.

The gambling giant said at the time that punters&#039; credit card details were safe.

Las Vegas Sands appears to have been targeted due to the casino chief executive office Sheldon Adelson&#039;s public support of Israel, according to Bloomberg.

The alleged Iranian hackers commandeered the website emblazoning it with a shoddy slapdash image of the Casino&#039;s US sites in flames

DON&#039;T PANIC! No credit card details lost after hackers crack world&#039;s largest casino group
Las Vegas Sands email and website still down after hackers trash CEO Sheldon Adelson
http://www.theregister.co.uk/2014/02/13/dont_panic_no_credit_card_details_lost_after_hackers_crack_worlds_largest_casino_group/]]></description>
		<content:encoded><![CDATA[<p>Iran hacks America where it hurts: Las Vegas casinos<br />
Digital Pearl Harbour debunked by US director of national intelligence<br />
<a href="http://www.theregister.co.uk/2015/02/27/iran_behind_us_casino_hack/" rel="nofollow">http://www.theregister.co.uk/2015/02/27/iran_behind_us_casino_hack/</a></p>
<p>US director of National Intelligence James Clapper has accused Iran of orchestrating a 2014 hack of the Las Vegas Sands casino. The attack crippled the magnificent cultural institution&#8217;s IT infrastructure.</p>
<p>Clapper told a US Senate Armed Services Committee Thursday (US time) that the hack of the US$14 billion casino was the handiwork of Iran rather than ordinary hacking groups, Bloomberg reports.</p>
<p>&#8220;While both of these nations (Iran and North Korea) have lesser technical capabilities in comparison to Russia and China, these destructive attacks demonstrate that Iran and North Korea are motivated and unpredictable cyber-actors,&#8221; Clapper says.</p>
<p>The attacks brought down the casino&#8217;s IT systems including email but not the most valuable components of the organisation.</p>
<p>The gambling giant said at the time that punters&#8217; credit card details were safe.</p>
<p>Las Vegas Sands appears to have been targeted due to the casino chief executive office Sheldon Adelson&#8217;s public support of Israel, according to Bloomberg.</p>
<p>The alleged Iranian hackers commandeered the website emblazoning it with a shoddy slapdash image of the Casino&#8217;s US sites in flames</p>
<p>DON&#8217;T PANIC! No credit card details lost after hackers crack world&#8217;s largest casino group<br />
Las Vegas Sands email and website still down after hackers trash CEO Sheldon Adelson<br />
<a href="http://www.theregister.co.uk/2014/02/13/dont_panic_no_credit_card_details_lost_after_hackers_crack_worlds_largest_casino_group/" rel="nofollow">http://www.theregister.co.uk/2014/02/13/dont_panic_no_credit_card_details_lost_after_hackers_crack_worlds_largest_casino_group/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/12/21/aftermath-security-trends-2014/comment-page-1/#comment-1348221</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 25 Feb 2015 11:28:50 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=27727#comment-1348221</guid>
		<description><![CDATA[A Cyberattack Has Caused Confirmed Physical Damage for the Second Time Ever
http://www.wired.com/2015/01/german-steel-mill-hack-destruction/

Amid all the noise the Sony hack generated over the holidays, a far more troubling cyber attack was largely lost in the chaos. Unless you follow security news closely, you likely missed it.

I’m referring to the revelation, in a German report released just before Christmas (.pdf), that hackers had struck an unnamed steel mill in Germany. They did so by manipulating and disrupting control systems to such a degree that a blast furnace could not be properly shut down, resulting in “massive”—though unspecified—damage.

This is only the second confirmed case in which a wholly digital attack caused physical destruction of equipment. The first case, of course, was Stuxnet

It’s not clear when the attack in Germany took place. The report, issued by Germany’s Federal Office for Information Security (or BSI), indicates the attackers gained access to the steel mill through the plant’s business network, then successively worked their way into production networks to access systems controlling plant equipment. The attackers infiltrated the corporate network using a spear-phishing attack

Once the attackers got a foothold on one system, they were able to explore the company’s networks, eventually compromising a “multitude” of systems, including industrial components on the production network.

“Failures accumulated in individual control components or entire systems,” the report notes. As a result, the plant was “unable to shut down a blast furnace in a regulated manner” which resulted in “massive damage to the system.”

“The know-how of the attacker was very pronounced not only in conventional IT security but extended to detailed knowledge of applied industrial controls and production processes,” the report says.

The report doesn’t name the plant or indicate when the breach first occurred or how long the hackers were in the network before the destruction occurred.

The report also illustrates the need for strict separation between business and production networks to keep hackers from leaping from one network to another and remotely accessing critical systems over the internet. Although a network can only be considered truly air-gapped if it’s not connected to the internet and is not connected to other systems that are connected to the internet, many companies believe that a software firewall separating the business and production network is sufficient to stop hackers from making that leap. But experts warn that a software firewall can be misconfigured or contain security holes that allow hackers to break through or bypass them nonetheless.]]></description>
		<content:encoded><![CDATA[<p>A Cyberattack Has Caused Confirmed Physical Damage for the Second Time Ever<br />
<a href="http://www.wired.com/2015/01/german-steel-mill-hack-destruction/" rel="nofollow">http://www.wired.com/2015/01/german-steel-mill-hack-destruction/</a></p>
<p>Amid all the noise the Sony hack generated over the holidays, a far more troubling cyber attack was largely lost in the chaos. Unless you follow security news closely, you likely missed it.</p>
<p>I’m referring to the revelation, in a German report released just before Christmas (.pdf), that hackers had struck an unnamed steel mill in Germany. They did so by manipulating and disrupting control systems to such a degree that a blast furnace could not be properly shut down, resulting in “massive”—though unspecified—damage.</p>
<p>This is only the second confirmed case in which a wholly digital attack caused physical destruction of equipment. The first case, of course, was Stuxnet</p>
<p>It’s not clear when the attack in Germany took place. The report, issued by Germany’s Federal Office for Information Security (or BSI), indicates the attackers gained access to the steel mill through the plant’s business network, then successively worked their way into production networks to access systems controlling plant equipment. The attackers infiltrated the corporate network using a spear-phishing attack</p>
<p>Once the attackers got a foothold on one system, they were able to explore the company’s networks, eventually compromising a “multitude” of systems, including industrial components on the production network.</p>
<p>“Failures accumulated in individual control components or entire systems,” the report notes. As a result, the plant was “unable to shut down a blast furnace in a regulated manner” which resulted in “massive damage to the system.”</p>
<p>“The know-how of the attacker was very pronounced not only in conventional IT security but extended to detailed knowledge of applied industrial controls and production processes,” the report says.</p>
<p>The report doesn’t name the plant or indicate when the breach first occurred or how long the hackers were in the network before the destruction occurred.</p>
<p>The report also illustrates the need for strict separation between business and production networks to keep hackers from leaping from one network to another and remotely accessing critical systems over the internet. Although a network can only be considered truly air-gapped if it’s not connected to the internet and is not connected to other systems that are connected to the internet, many companies believe that a software firewall separating the business and production network is sufficient to stop hackers from making that leap. But experts warn that a software firewall can be misconfigured or contain security holes that allow hackers to break through or bypass them nonetheless.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/12/21/aftermath-security-trends-2014/comment-page-1/#comment-1348157</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 25 Feb 2015 09:14:51 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=27727#comment-1348157</guid>
		<description><![CDATA[HP: 10 most common security issues in 2014 were from code over two years old
... and sometimes dating back decades 
http://www.theinquirer.net/inquirer/news/2396783/hp-10-most-common-security-issues-in-2014-were-from-code-over-two-years-old

NEARLY HALF of all security breaches come from vulnerabilities that are between two and four years old, according to this year&#039;s HP Cyber Risk Report entitled The Past Is Prologue.

The annual report found that the most prevalent problems came as a result of server misconfiguration, and that the primary causes of commonly exploited software vulnerabilities are defects, bugs and logic flaws.

But perhaps most disturbing of all was the news that Internet of Things (IoT) devices and mobile malware have introduced a significant extra security risk.

The entire top 10 vulnerabilities exposed in 2014 came from code written years, and in some cases decades, previously.

&quot;Many of the biggest security risks are issues we’ve known about for decades, leaving organisations unnecessarily exposed,&quot; said Art Gilliland, senior vice president and general manager for enterprise security products at HP.

&quot;We can’t lose sight of defending against these known vulnerabilities by entrusting security to the next silver bullet technology. Rather, organisations must employ fundamental security tactics to address known vulnerabilities and, in turn, eliminate significant amounts of risk.&quot;]]></description>
		<content:encoded><![CDATA[<p>HP: 10 most common security issues in 2014 were from code over two years old<br />
&#8230; and sometimes dating back decades<br />
<a href="http://www.theinquirer.net/inquirer/news/2396783/hp-10-most-common-security-issues-in-2014-were-from-code-over-two-years-old" rel="nofollow">http://www.theinquirer.net/inquirer/news/2396783/hp-10-most-common-security-issues-in-2014-were-from-code-over-two-years-old</a></p>
<p>NEARLY HALF of all security breaches come from vulnerabilities that are between two and four years old, according to this year&#8217;s HP Cyber Risk Report entitled The Past Is Prologue.</p>
<p>The annual report found that the most prevalent problems came as a result of server misconfiguration, and that the primary causes of commonly exploited software vulnerabilities are defects, bugs and logic flaws.</p>
<p>But perhaps most disturbing of all was the news that Internet of Things (IoT) devices and mobile malware have introduced a significant extra security risk.</p>
<p>The entire top 10 vulnerabilities exposed in 2014 came from code written years, and in some cases decades, previously.</p>
<p>&#8220;Many of the biggest security risks are issues we’ve known about for decades, leaving organisations unnecessarily exposed,&#8221; said Art Gilliland, senior vice president and general manager for enterprise security products at HP.</p>
<p>&#8220;We can’t lose sight of defending against these known vulnerabilities by entrusting security to the next silver bullet technology. Rather, organisations must employ fundamental security tactics to address known vulnerabilities and, in turn, eliminate significant amounts of risk.&#8221;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/12/21/aftermath-security-trends-2014/comment-page-1/#comment-1347646</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 24 Feb 2015 13:26:17 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=27727#comment-1347646</guid>
		<description><![CDATA[Don&#039;t be fooled! He&#039;s not from the IT crowd... he&#039;s a CYBERSPY – FireEye
Is that Tom the techie or a Chinese spear-phisherman?
http://www.theregister.co.uk/2015/02/24/fireeye_threat_report/

Impersonating IT departments in spear-phishing attacks is becoming an increasingly popular tactic among hackers, particularly in cyber-espionage attacks.

IT staff themed phishing emails comprised 78 per cent of observed phishing schemes picked up by FireEye in 2014, compared to just 44 per cent in 2013.

The sixth annual FireEye Mandiant M-Trends report, published on Tuesday, reports that organisations are getting slightly speedier at picking up trespassers in their network. Breach detection times dropped from 229 days in 2013 to 205 days last year. The slight improvement still means that successful hacker attacks remain undetected for months.

In some cases breaches can go undetected for years. 

Hackers are adopting more sophisticated and stealthy tactics.

More details can be found in the 2015 Mandiant M-Trends report
https://www2.fireeye.com/rs/fireye/images/rpt-m-trends-2015.pdf]]></description>
		<content:encoded><![CDATA[<p>Don&#8217;t be fooled! He&#8217;s not from the IT crowd&#8230; he&#8217;s a CYBERSPY – FireEye<br />
Is that Tom the techie or a Chinese spear-phisherman?<br />
<a href="http://www.theregister.co.uk/2015/02/24/fireeye_threat_report/" rel="nofollow">http://www.theregister.co.uk/2015/02/24/fireeye_threat_report/</a></p>
<p>Impersonating IT departments in spear-phishing attacks is becoming an increasingly popular tactic among hackers, particularly in cyber-espionage attacks.</p>
<p>IT staff themed phishing emails comprised 78 per cent of observed phishing schemes picked up by FireEye in 2014, compared to just 44 per cent in 2013.</p>
<p>The sixth annual FireEye Mandiant M-Trends report, published on Tuesday, reports that organisations are getting slightly speedier at picking up trespassers in their network. Breach detection times dropped from 229 days in 2013 to 205 days last year. The slight improvement still means that successful hacker attacks remain undetected for months.</p>
<p>In some cases breaches can go undetected for years. </p>
<p>Hackers are adopting more sophisticated and stealthy tactics.</p>
<p>More details can be found in the 2015 Mandiant M-Trends report<br />
<a href="https://www2.fireeye.com/rs/fireye/images/rpt-m-trends-2015.pdf" rel="nofollow">https://www2.fireeye.com/rs/fireye/images/rpt-m-trends-2015.pdf</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/12/21/aftermath-security-trends-2014/comment-page-1/#comment-1347628</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 24 Feb 2015 12:46:30 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=27727#comment-1347628</guid>
		<description><![CDATA[The State of Email Trust 2014 Report
http://info.agari.com/state-of-email-trust-2014.html

As you saw in the headlines and news, 2014 was a big year for email threats.
And from our findings - the proof is in the data.

By summarizing the TrustIndex data we gathered quarterly in 2014 that measures how well both individual companies and industries as a whole are protecting their customers from email cyberattacks, we saw that email security improved somewhat in 2014, but most companies still haven’t implemented technology that protects them from cybercrime.]]></description>
		<content:encoded><![CDATA[<p>The State of Email Trust 2014 Report<br />
<a href="http://info.agari.com/state-of-email-trust-2014.html" rel="nofollow">http://info.agari.com/state-of-email-trust-2014.html</a></p>
<p>As you saw in the headlines and news, 2014 was a big year for email threats.<br />
And from our findings &#8211; the proof is in the data.</p>
<p>By summarizing the TrustIndex data we gathered quarterly in 2014 that measures how well both individual companies and industries as a whole are protecting their customers from email cyberattacks, we saw that email security improved somewhat in 2014, but most companies still haven’t implemented technology that protects them from cybercrime.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/12/21/aftermath-security-trends-2014/comment-page-1/#comment-1334328</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 28 Jan 2015 07:44:06 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=27727#comment-1334328</guid>
		<description><![CDATA[2014: A Monumental Year for Cyber Attacks
http://www.eetimes.com/author.asp?section_id=36&amp;doc_id=1325433&amp;

As consumer and industrial IoT adoption rises, so does the risk for cyber-attacks. Here&#039;s what happened in 2014, as a reminder and warning.

In every single month in 2014, the cyber world experienced an attack that would have made the top-three list in any previous year. The numbers were stunning all year long: 56 million hacked at Home Depot, 76 million at JP Morgan Chase. Target, K-Mart, UPS, and the year’s most colorful attack -- Sony Pictures Entertainment -- all got hit.

The Sony Pictures Entertainment hack grabbed so much cyber ink, nobody noticed that the company’s PlayStation network was attacked -- yet again -- in early December, creating a system-wide outage. This month-by-month list is mind-numbing. And we left off the small hacks that only affected a few hundred thousand users.]]></description>
		<content:encoded><![CDATA[<p>2014: A Monumental Year for Cyber Attacks<br />
<a href="http://www.eetimes.com/author.asp?section_id=36&#038;doc_id=1325433&#038;amp" rel="nofollow">http://www.eetimes.com/author.asp?section_id=36&#038;doc_id=1325433&#038;amp</a>;</p>
<p>As consumer and industrial IoT adoption rises, so does the risk for cyber-attacks. Here&#8217;s what happened in 2014, as a reminder and warning.</p>
<p>In every single month in 2014, the cyber world experienced an attack that would have made the top-three list in any previous year. The numbers were stunning all year long: 56 million hacked at Home Depot, 76 million at JP Morgan Chase. Target, K-Mart, UPS, and the year’s most colorful attack &#8212; Sony Pictures Entertainment &#8212; all got hit.</p>
<p>The Sony Pictures Entertainment hack grabbed so much cyber ink, nobody noticed that the company’s PlayStation network was attacked &#8212; yet again &#8212; in early December, creating a system-wide outage. This month-by-month list is mind-numbing. And we left off the small hacks that only affected a few hundred thousand users.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Indian image bank</title>
		<link>https://www.epanorama.net/blog/2014/12/21/aftermath-security-trends-2014/comment-page-1/#comment-1330617</link>
		<dc:creator><![CDATA[Indian image bank]]></dc:creator>
		<pubDate>Mon, 19 Jan 2015 09:15:01 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=27727#comment-1330617</guid>
		<description><![CDATA[Thanks for your marvelous posting! I truly enjoyed reading it, you could be a great 
author. I will make sure to bookmark your blog 
and will often come back very soon. I want to encourage you to continue your great work, have 
a nice morning!]]></description>
		<content:encoded><![CDATA[<p>Thanks for your marvelous posting! I truly enjoyed reading it, you could be a great<br />
author. I will make sure to bookmark your blog<br />
and will often come back very soon. I want to encourage you to continue your great work, have<br />
a nice morning!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/12/21/aftermath-security-trends-2014/comment-page-1/#comment-1328036</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 12 Jan 2015 11:43:34 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=27727#comment-1328036</guid>
		<description><![CDATA[The Real Story Behind the Kate Upton Nude DDoS Attack
http://www.securityweek.com/real-story-behind-kate-upton-nude-ddos-attack

I recently heard about an interesting DDoS story in New Zealand involving the nude selfies of cover girl Kate Upton and Hunger Games star Jennifer Lawrence. The photos were stolen from Apple’s iCloud service. The story seemed like the perfect, illustrative fable about everything that is wrong with Internet security today. It had all the classic buzzwords: cloud security, malware, DDoS, Apple, 4chan, and lazy, lustful Internet users.

Kate Upton Photos Crash the InternetBut while parts of the story were true, others...not so much. 

The first third of the story is more or less true; the personal data of the celebrities was indeed ex-filtrated from iCloud. Apple claims that it was due to the weak iCloud passwords used by the celebs themselves, but that explanation is just semantics. If you read an EULA carefully (many of them 25 pages or more), you will find that you personally are responsible for the security of your data in the cloud. That’s the state of cloud security today.

The middle part of the story is true as well: nearly every site hosting the celebrity photos was also hosting some kind of malware.

Ultimately, it turned out to be sheer coincidence that the attack happened in the days just after the iCloud breach. The media was so taken with the idea that Kate Upton nude photos had caused a DDoS attack that they just took the story and ran with it. It’s not difficult to understand why]]></description>
		<content:encoded><![CDATA[<p>The Real Story Behind the Kate Upton Nude DDoS Attack<br />
<a href="http://www.securityweek.com/real-story-behind-kate-upton-nude-ddos-attack" rel="nofollow">http://www.securityweek.com/real-story-behind-kate-upton-nude-ddos-attack</a></p>
<p>I recently heard about an interesting DDoS story in New Zealand involving the nude selfies of cover girl Kate Upton and Hunger Games star Jennifer Lawrence. The photos were stolen from Apple’s iCloud service. The story seemed like the perfect, illustrative fable about everything that is wrong with Internet security today. It had all the classic buzzwords: cloud security, malware, DDoS, Apple, 4chan, and lazy, lustful Internet users.</p>
<p>Kate Upton Photos Crash the InternetBut while parts of the story were true, others&#8230;not so much. </p>
<p>The first third of the story is more or less true; the personal data of the celebrities was indeed ex-filtrated from iCloud. Apple claims that it was due to the weak iCloud passwords used by the celebs themselves, but that explanation is just semantics. If you read an EULA carefully (many of them 25 pages or more), you will find that you personally are responsible for the security of your data in the cloud. That’s the state of cloud security today.</p>
<p>The middle part of the story is true as well: nearly every site hosting the celebrity photos was also hosting some kind of malware.</p>
<p>Ultimately, it turned out to be sheer coincidence that the attack happened in the days just after the iCloud breach. The media was so taken with the idea that Kate Upton nude photos had caused a DDoS attack that they just took the story and ran with it. It’s not difficult to understand why</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/12/21/aftermath-security-trends-2014/comment-page-1/#comment-1326970</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 09 Jan 2015 09:22:32 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=27727#comment-1326970</guid>
		<description><![CDATA[State of Bitcoin 2015: Ecosystem Grows Despite Price Decline
http://www.coindesk.com/state-bitcoin-2015-ecosystem-grows-despite-price-decline/

CoinDesk is pleased to announce the latest quarterly State of Bitcoin report, featuring a 2014 Year in Review, an in-depth analysis of data and events from the fourth quarter of 2014 and a look ahead to what 2015 might bring. 

Overall, 2014 could be characterized as a ‘Tale of Two Bitcoins’.

On the one hand, significant bitcoin venture investment continued and much progress was made in furthering adoption, particularly in bitcoin payment acceptance by big brand names such as Microsoft and Dell.

On the other hand, early on in 2014, the collapse of Mt Gox dealt a crippling blow to bitcoin’s extraordinary price momentum. 

All-time bitcoin startup VC investment crosses $400 million]]></description>
		<content:encoded><![CDATA[<p>State of Bitcoin 2015: Ecosystem Grows Despite Price Decline<br />
<a href="http://www.coindesk.com/state-bitcoin-2015-ecosystem-grows-despite-price-decline/" rel="nofollow">http://www.coindesk.com/state-bitcoin-2015-ecosystem-grows-despite-price-decline/</a></p>
<p>CoinDesk is pleased to announce the latest quarterly State of Bitcoin report, featuring a 2014 Year in Review, an in-depth analysis of data and events from the fourth quarter of 2014 and a look ahead to what 2015 might bring. </p>
<p>Overall, 2014 could be characterized as a ‘Tale of Two Bitcoins’.</p>
<p>On the one hand, significant bitcoin venture investment continued and much progress was made in furthering adoption, particularly in bitcoin payment acceptance by big brand names such as Microsoft and Dell.</p>
<p>On the other hand, early on in 2014, the collapse of Mt Gox dealt a crippling blow to bitcoin’s extraordinary price momentum. </p>
<p>All-time bitcoin startup VC investment crosses $400 million</p>
]]></content:encoded>
	</item>
</channel>
</rss>
